Yu Zhang

ORCID: 0000-0003-2040-5059
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Opportunistic and Delay-Tolerant Networks
  • Cooperative Communication and Network Coding
  • Peer-to-Peer Network Technologies
  • Advanced Data Storage Technologies
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • IoT and Edge/Fog Computing
  • Software-Defined Networks and 5G
  • Complex Network Analysis Techniques
  • Geometric and Algebraic Topology
  • Blockchain Technology Applications and Security
  • Network Packet Processing and Optimization
  • Mathematical Dynamics and Fractals
  • Data Stream Mining Techniques
  • IPv6, Mobility, Handover, Networks, Security
  • Network Traffic and Congestion Control
  • Carbon and Quantum Dots Applications
  • semigroups and automata theory
  • Nonlinear Dynamics and Pattern Formation
  • Aquaculture disease management and microbiota
  • Recommender Systems and Techniques
  • Age of Information Optimization
  • Mobile Ad Hoc Networks
  • Advanced Malware Detection Techniques

Harbin Institute of Technology
2010-2024

Peng Cheng Laboratory
2021-2024

Huazhong University of Science and Technology
2020-2024

Guangxi University
2023-2024

Hefei University of Technology
2023

Gannan Medical University
2022

PLA Army Engineering University
2020

Beijing Institute of Technology
2018-2020

National University of Defense Technology
2020

Beijing City University
2019

Logs play an important role in the maintenance of large-scale online service systems. When fails, engineers need to examine recorded logs gain insights into failure and identify potential problems. Traditionally, perform simple keyword search (such as "error" "exception") that may be associated with failures. Such approach is often time consuming error prone. Through our collaboration Microsoft product teams, we propose LogCluster, clusters ease log-based problem identification. LogCluster...

10.1145/2889160.2889232 article EN 2016-05-14

Vehicular named data networking (VNDN) is a architecture candidate to support various kinds of content-oriented applications in high dynamic topology environment. Its inherent in-network caching facilitates content delivery and the communication efficiency vehicular network. However, during process delivery, fast varying vehicle mobility changes position relay routers, which makes packet delivered through reverse path difficult. Furthermore, frequent link disruption retransmission lead...

10.1109/access.2019.2897747 article EN cc-by-nc-nd IEEE Access 2019-01-01

10.1007/s11390-008-9192-1 article EN Journal of Computer Science and Technology 2008-11-01

Many solutions have been recently proposed to support the processing of streaming graphs. However, for each graph snapshot a graph, new states vertices affected by updates are propagated irregularly along topology. Despite years' research efforts, existing approaches still suffer from serious problems redundant computation overhead and irregular memory access, which severely underutilizes many-core processor. To address these issues, this paper proposes topology-driven programmable...

10.1145/3470496.3527409 article EN 2022-05-31

Large low Earth orbit (LEO) satellite constellations are intended to provide global low-latency high-bandwidth Internet connectivity. Due their large scale and high mobility nature, networking is a big challenge. In this paper, we investigate applying Named Data Networking (NDN) scenario. Specifically, discuss that NDN's architectural benefits, such as adaptive forwarding, in-network caching, off-the-grid communication, data mule service, in-network/edge computing, support, data-centric...

10.1145/3460417.3482970 article EN 2021-09-13

This innovative research integrates methodologies from two distinct studies to advance our comprehension of immersive virtual experiences within the realms fashion and e-commerce. By amalgamating insights both methodologies, this refined approach introduces novel components, including a shopping environment, post-VR behavior analysis, biometric data collection, extended interviews, longitudinal study design, control group implementation. Participants engaged in 360-degree VR shows using...

10.35940/ijaent.f8023.11030324 article EN cc-by-nc-nd International Journal of Advanced Engineering and Nano Technology 2024-03-28

Reentrancy vulnerability as one of the most notorious vulnerabilities, has been a prominent topic in smart contract security research. Research shows that existing detection presents range challenges, especially contracts continue to increase complexity. Existing tools perform poorly terms efficiency and successful rates for vulnerabilities complex contracts. To effectively detect reentrancy with logic, we propose tool named SliSE. SliSE’s process consists two stages: Warning Search Symbolic...

10.1145/3643734 article EN Proceedings of the ACM on software engineering. 2024-07-12

This paper reports a novel method for identification of two aliphatic position isomers between α-ketoglutaric acid (α-KA) and β-ketoglutaric (β-KA) by their different perturbation effects on Briggs-Rauscher oscillating system, in which tetraaza-macrocyclic complex [NiL](ClO4)2 is used as the catalyst. The ligand L 5,7,7,12,14,14-hexamethyl-1,4,8,11-tetraazacyclotetradeca-4,11-diene. experimental results have shown that addition α-KA into system does not affect patterns, while presence β-KA...

10.1021/acs.analchem.5b02649 article EN Analytical Chemistry 2015-08-31

Domain Name System (DNS) is a widely used infrastructure for remote control and batch management of IoT devices. As critical Internet infrastructure, DNS structured as tree‐like hierarchy with single root zone authority at the top, which puts operation risk from point failure. The current lack transparency accountability, since only file published final outcome operations inside authority. Towards distributed in DNS, this paper presents blockchain‐based architecture—RootChain, composed...

10.1155/2021/6620236 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

10.1007/s11432-010-0053-5 article EN Science China Information Sciences 2010-03-01

Abstract The reentrancy vulnerability in smart contracts has caused significant losses the digital currency economy. Existing solutions for detecting and repairing this are limited scope lack a comprehensive framework. Additionally, there is currently of guidance methods effectively pinpointing location vulnerabilities. proposed bytecode‐level method addresses these challenges by incorporating detection module, an auxiliary localization repair module. An opcode classification introduced...

10.1049/blc2.12043 article EN cc-by-nc-nd IET Blockchain 2023-09-04

Publish/Subscribe (Pub/Sub) is becoming an increasingly popular message delivery technique in the Internet of Things (IoT) era. However, classical not suitable for some emerging IoT applications such as smart grid, transportation and sensor/actuator due to its lack QoS capability.

10.1145/2335484.2335499 article EN 2012-07-16

Large low Earth orbit (LEO) satellite constellations provide low-latency and high-bandwidth Internet connectivity at the global scale. One major challenge is to handle frequent handovers. Named Data Networking (NDN) adopts a pull-based communication model, which allows users retrieve data that fail come back because of handovers by retransmitting corresponding requests, hence simplifying mobility management when retrieving data. However, we find relying on such retransmissions alone can be...

10.1145/3479239.3485699 article EN 2021-11-17

Scanning activities are usually conducted by infected hosts to discover other vulnerable or a motivated adversary gather information, and typically precursor most of the cyber attacks. There many scan detection approaches at present; however, them focus on enterprise-level network where traffic volume is low, bi-directional packet-level information available. This paper proposes new port approach-time based flow size distribution sequential hypothesis testing TFDS briefly, for high-speed...

10.1109/itng.2009.16 article EN 2009-01-01

In order to make device-to-device (D2D) content sharing give full play its advantage of improving local area services, one the important issues is decide channels that D2D pairs occupy. Most existing works study this issue in static environment, and ignore guidance for select channel adaptively. paper, we investigate dynamic environment where pairs' activeness wireless are dynamic. Specifically, propose a pricing-based approach guide different according spectrum resource states Then,...

10.1109/twc.2020.3040040 article EN IEEE Transactions on Wireless Communications 2020-12-03

10.1007/s11390-017-1801-4 article EN Journal of Computer Science and Technology 2017-11-01

With the development of scientific information technology, emergence Internet Things (IOT) promoted industry once again to a new stage economic and technological development. From perspective confidentiality, integrity, availability security, this paper analyzed current state IOT security threats, then researched primary technologies architecture. architecture established foundation for reliable system IOT.

10.1109/iaeac.2018.8577778 article EN 2018-10-01

Traffic Information System (TIS) is a major application over vehicular networks. Decentralized TIS relies on vehicle-2-vehicle communications, and efficient traffic information dissemination challenge. In this paper, we propose preliminary design to support the retrieval in ad hoc networks (VANET). Our adopts an information-centric communication model, probabilistic forwarding strategy based names geolocations. We implemented prototype of our evaluated its performance ndnSIM.

10.1109/hoticn.2018.8605966 article EN 2018-08-01
Coming Soon ...